Re: [DNSOP] AS112 for TLDs

2008-04-06 Thread Florian Weimer
* Mark Andrews: There really is only one solution to preventing bogus traffic reaching the root servers and that is to run a local copy of the root zone. Or sign the root and use aggressive negative caching (which is currently prohibited by the RFCs, I'm told). I agree that

Re: [DNSOP] AS112 for TLDs

2008-04-06 Thread Florian Weimer
* Joe Baptista: I agree that information leakage is a problem. Curiously enough, no root server or TLD operators that I know of has published some sort of privacy statement that underlines how they deal with this issue. They are not the ones generating this traffic. Its users as they cross

Re: [DNSOP] AS112 for TLDs

2008-04-06 Thread Joe Baptista
On Sun, Apr 6, 2008 at 9:15 AM, Florian Weimer [EMAIL PROTECTED] wrote: It means that everybody who can make a BGP announcement can legitimately hijack DNS traffic to those TLDs. Is this really what we want? Thats an AS112 security issue. Are they to be trusted? Maybe? Maybe not. AS112